Jump to content
Clubplanet Nightlife Community

nexusgroove

Members
  • Posts

    5,408
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by nexusgroove

  1. nexusgroove

    oh well.

    I need to catch up to FUnk on post points.. so excuse my random convo's. Hope you all had a great New Year's night and may this 2009 bring you the best. FYI, the world end in 2012... .. Party Hardy Nx
  2. Anyone? how is it, cool? Is it somewhere fresh to party at? Someone told me they have these 2 kids playing afterhours that rock the place... wondering.
  3. Is closing or something??? Is this true? and if so where are the parties going to be moved to? I got a cool place for those parties... just not in the beach.
  4. if you are a hardcore party goer, do it all till you drop. IMO; the hotel parties are the best since most of then are thrown by DJ's and their labels (Shore Club, Delano, etc..) Each of these parties are unique more catered to a specific click and for the specific EDM groups. Clubs like Space basically stays open for days with most big headliner DJ's in town. To each their own. I can not comment on Ultra since I haven't been there is years. But yeah WMC badge will get you around easy. Its all in what your real interest is with the conference. Some are all about the music, some for the entertainment, some to be seen and others to just get lost in the sea of energy. imo - but what do I really know
  5. what kind of party? how big? ....
  6. you are so gay! :0) my vote counted and that's why he was elected~
  7. Come on by, check out my meat..... .lol
  8. nexusgroove

    Wow .. ..

    Welcome, nexusgroove. You last visited: 10-14-07 at 08:09 PM Hello, my name is Nexus!
  9. "Highend Technobeams, Studio Colors, Colorspots, Trackspots, and Dataflashers" are we taking a trip back in time to the 80's and 90's? do they even make replacement parts for those fixtures.. come on pod.... think man think! lol Shit load the place up with america DJ lights while you are at it.... We need a time machine
  10. Ever wonder what happens to those bottles you leave behind at your VIP tables when you leave...? Well, next time you buy a drink just wonder.... Rumor has it that a management company running in Miami and ft. Lauderdale that has a bad habit of pouring back those leftovers ... No names will be said. Be a good clubber, when you are done with your bottles put them in the ice buckets upside down allowing the left overs to drain, not get poured back. Or else you will be drinking backwash the next time you buy a drink at the bar..
  11. wow. cpnews kicking some ass.. were is everyone.? // ? www.groovemiami.com/31
  12. http://www.wannman.com/cam/index.php For those that don't like to venture outside in the rain. Happy 4th of July peeps. NX
  13. nexusgroove

    Infomation:

    How Facial Recognition Systems Work by Ryan Johnson and Kevin Bonsor Introduction to How Facial Recognition Systems Work Anyone who has seen the TV show "Las Vegas" has seen facial recognition software in action. In any given episode, the security department at the fictional Montecito Hotel and Casino uses its video surveillance system to pull an image of a card counter, thief or blacklisted individual. It then runs that image through the database to find a match and identify the person. By the end of the hour, all bad guys are escorted from the casino or thrown in jail. But what looks so easy on TV doesn't always translate as well in the real world. In 2001, the Tampa Police Department installed cameras equipped with facial recognition technology in their Ybor City nightlife district in an attempt to cut down on crime in the area. The system failed to do the job, and it was scrapped in 2003 due to ineffectiveness. People in the area were seen wearing masks and making obscene gestures, prohibiting the cameras from getting a clear enough shot to identify anyone. Boston's Logan Airport also ran two separate tests of facial recognition systems at its security checkpoints using volunteers. Over a three month period, the results were disappointing. According to the Electronic Privacy Information Center, the system only had a 61.4 percent accuracy rate, leading airport officials to pursue other security options. In this article, we will look at the history of facial recognition systems, the changes that are being made to enhance their capabilities and how governments and private companies use (or plan to use) them. Photo © Identix Inc. Identix's FaceIt software measures nodal points on the human face to create a faceprint and find a match. See more pictures of facial recognition systems at work. Humans have always had the innate ability to recognize and distinguish between faces, yet computers only recently have shown the same ability. In the mid 1960s, scientists began work on using the computer to recognize human faces. Since then, facial recognition software has come a long way. Identix®, a company based in Minnesota, is one of many developers of facial recognition technology. Its software, FaceIt®, can pick someone's face out of a crowd, extract the face from the rest of the scene and compare it to a database of stored images. In order for this software to work, it has to know how to differentiate between a basic face and the rest of the background. Facial recognition software is based on the ability to recognize a face and then measure the various features of the face. Every face has numerous, distinguishable landmarks, the different peaks and valleys that make up facial features. FaceIt defines these landmarks as nodal points. Each human face has approximately 80 nodal points. Some of these measured by the software are: Distance between the eyes Width of the nose Depth of the eye sockets The shape of the cheekbones The length of the jaw lineThese nodal points are measured creating a numerical code, called a faceprint, representing the face in the database. Photo © Identix Inc. FaceIt software compares the faceprint with other images in the database. In the past, facial recognition software has relied on a 2D image to compare or identify another 2D image from the database. To be effective and accurate, the image captured needed to be of a face that was looking almost directly at the camera, with little variance of light or facial expression from the image in the database. This created quite a problem. In most instances the images were not taken in a controlled environment. Even the smallest changes in light or orientation could reduce the effectiveness of the system, so they couldn't be matched to any face in the database, leading to a high rate of failure. In the next section, we will look at ways to correct the problem. 3D Facial Recognition Photo © A4Vision, Inc. The Vision 3D + 2D ICAO camera is used to perform enrollment, verification and identification of 3D and 2D face images. A newly-emerging trend in facial recognition software uses a 3D model, which claims to provide more accuracy. Capturing a real-time 3D image of a person's facial surface, 3D facial recognition uses distinctive features of the face -- where rigid tissue and bone is most apparent, such as the curves of the eye socket, nose and chin -- to identify the subject. These areas are all unique and don't change over time. Using depth and an axis of measurement that is not affected by lighting, 3D facial recognition can even be used in darkness and has the ability to recognize a subject at different view angles with the potential to recognize up to 90 degrees (a face in profile). Using the 3D software, the system goes through a series of steps to verify the identity of an individual. Detection Acquiring an image can be accomplished by digitally scanning an existing photograph (2D) or by using a video image to acquire a live picture of a subject (3D). Alignment Once it detects a face, the system determines the head's position, size and pose. As stated earlier, the subject has the potential to be recognized up to 90 degrees, while with 2D, the head must be turned at least 35 degrees toward the camera. Measurement The system then measures the curves of the face on a sub-millimeter (or microwave) scale and creates a template. Representation The system translates the template into a unique code. This coding gives each template a set of numbers to represent the features on a subject's face. Matching If the image is 3D and the database contains 3D images, then matching will take place without any changes being made to the image. However, there is a challenge currently facing databases that are still in 2D images. 3D provides a live, moving variable subject being compared to a flat, stable image. New technology is addressing this challenge. When a 3D image is taken, different points (usually three) are identified. For example, the outside of the eye, the inside of the eye and the tip of the nose will be pulled out and measured. Once those measurements are in place, an algorithm (a step-by-step procedure) will be applied to the image to convert it to a 2D image. After conversion, the software will then compare the image with the 2D images in the database to find a potential match. Verification or Identification In verification, an image is matched to only one image in the database (1:1). For example, an image taken of a subject may be matched to an image in the Department of Motor Vehicles database to verify the subject is who he says he is. If identification is the goal, then the image is compared to all images in the database resulting in a score for each potential match (1:N). In this instance, you may take an image and compare it to a database of mug shots to identify who the subject is. Next, we'll look at how skin biometrics can help verify matches. Surface Texture Analysis The image may not always be verified or identified in facial recognition alone. Identix® has created a new product to help with precision. The development of FaceIt®Argus uses skin biometrics, the uniqueness of skin texture, to yield even more accurate results. The surface texture analysis (STA) algorithm operates on the top percentage of results as determined by the local feature analysis. STA creates a skinprint and performs either a 1:1 or 1:N match depending on whether you're looking for verification or identification. The process, called Surface Texture Analysis, works much the same way facial recognition does. A picture is taken of a patch of skin, called a skinprint. That patch is then broken up into smaller blocks. Using algorithms to turn the patch into a mathematical, measurable space, the system will then distinguish any lines, pores and the actual skin texture. It can identify differences between identical twins, which is not yet possible using facial recognition software alone. According to Identix, by combining facial recognition with surface texture analysis, accurate identification can increase by 20 to 25 percent. FaceIt currently uses three different templates to confirm or identify the subject: vector, local feature analysis and surface texture analysis. The vector template is very small and is used for rapid searching over the entire database primarily for one-to-many searching. The local feature analysis (LFA) template performs a secondary search of ordered matches following the vector template. The surface texture analysis (STA) is the largest of the three. It performs a final pass after the LFA template search, relying on the skin features in the image, which contains the most detailed information.By combining all three templates, FaceIt® has an advantage over other systems. It is relatively insensitive to changes in expression, including blinking, frowning or smiling and has the ability to compensate for mustache or beard growth and the appearance of eyeglasses. The system is also uniform with respect to race and gender. Photo © Identix Inc. Poor lighting can make it more difficult for facial recognition software to verify or identify someone. However, it is not a perfect system. There are some factors that could get in the way of recognition, including: Significant glare on eyeglasses or wearing sunglasses Long hair obscuring the central part of the face Poor lighting that would cause the face to be over- or under-exposed Lack of resolution (image was taken too far away)Identix isn't the only company with facial recognition systems available. While most work the same way FaceIt does, there are some variations. For example, a company called Animetrix, Inc. has a product called FACEngine ID® SetLight that can correct lighting conditions that cannot normally be used, reducing the risk of false matches. Sensible Vision, Inc. has a product that can secure a computer using facial recognition. The computer will only power on and stay accessible as long as the correct user is in front of the screen. Once the user moves out of the line of sight, the computer is automatically secured from other users. Due to these strides in technology, facial and skin recognition systems are more widely used than just a few years ago. In the next section, we'll look at where and how they are being used and what's in store for the future. Current and Future Uses of Facial Recognition Systems In the past, the primary users of facial recognition software have been law enforcement agencies, who used the system to capture random faces in crowds. Some government agencies have also been using the systems for security and to eliminate voter fraud. The U.S. government has recently begun a program called US-VISIT (United States Visitor and Immigrant Status Indicator Technology), aimed at foreign travelers gaining entry to the United States. When a foreign traveler receives his visa, he will submit fingerprints and have his photograph taken. The fingerprints and photograph are checked against a database of known criminals and suspected terrorists. When the traveler arrives in the United States at the port of entry, those same fingerprints and photographs will be used to verify that the person who received the visa is the same person attempting to gain entry. Photo courtesy U.S. Department of Homeland Security Jim Williams, head of US-VISIT, former Secretary Tom Ridge and former Commissioner Robert Bonner launch US-VISIT in Atlanta, Georgia. However, there are now many more situations where the software is becoming popular. As the systems become less expensive, making their use more widespread. They are now compatible with cameras and computers that are already in use by banks and airports. The TSA is currently working on and testing out its Registered Traveler program. The program will provide speedy security screening for passengers who volunteer information and complete a security threat assessment. At the airport there will be specific lines for the Registered Traveler to go through that will move more quickly, verifying the traveler by their facial features. Other potential applications include ATM and check-cashing security. The software is able to quickly verify a customer's face. After a customer consents, the ATM or check-cashing kiosk captures a digital image of him. The FaceIt software then generates a faceprint of the photograph to protect customers against identity theft and fraudulent transactions. By using the facial recognition software, there's no need for a picture ID, bankcard or personal identification number (PIN) to verify a customer's identity. This way businesses can prevent fraud from occurring. Lots More Information Keepe posting your pictures online!
  14. This is a classic D7 dozer!
  15. Elmo, Puppy Dogs, and Other Drug Smugglers What do Elmo the Muppet and cute, cuddly puppy dogs have in common? They were both caught smuggling dope in 2006. The U.S. Drug Enforcement Administration is honoring '06 with The Year in Pictures, an online photo essay of some of its most noteworthy cases. I'm reprinting here a few of the highlights. (All photos and captions below are courtesy of the DEA.) We start with a bust that somehow eluded me, of an alleged meth trafficking ring that had the gall to recruit Sesame Street's Elmo to smuggle its dastardly dope. The Elmo dolls each held as much as 4 pounds of meth, which were smuggled by a Latino gang from California to Colorado, according to the feds. The fellow in the suit, holding the suspect below, is Jeffrey Sweetin, special agent in charge of the DEA's Rocky Mountain Field Division. Sources say the muppet was presumed armed and dangerous. Oct. 25, 2006: A large methamphetamine distribution organization based in Greeley, Colo., used Elmo dolls to smuggle methamphetamine. The investigation, which began in September 2005, has resulted in the seizure of over 45 pounds of high quality ICE methamphetamine, 1.1 kilos of cocaine, and $59,000 in cash. As if preying on poor Elmo weren't enough, here's a shot from a February case in which Colombian traffickers smuggled liquid heroin surgically implanted into the bodies of live puppies. Yuk. Talk about bad guys ... (For more shots of the puppies, check out this DEA update.) 2006: DEA arrested 22 heroin traffickers based out of Medellin, Colombia, who used puppies to smuggle drugs. The drug traffickers surgically implanted packets of liquid heroin into purebred dogs. All of the puppies who survived were adopted by local families and are still doing well today. Here's another case, which somehow escaped my attention, of a budding Bay Area entrepreneur who allegedly mimicked popular candy bars and soft drinks with pot-laced recipes. As DEA's Special Agent in Charge Francisco Peña put it, "In a way, this case sort of answers the question, 'What will they think of next?' " March 16, 2006: DEA arrested 12 people in the San Francisco Bay Area and seized hundreds of marijuana-laced candy and soft drinks. Some of the product labels seized by investigators included Stoney Ranchers, Munchy Way, Rasta Reece's, Buddafingers, and Pot Tarts. Finally, here's a shot of the largest of more than 20 tunnels the feds have uncovered along the U.S.-Mexico border since 9/11. Give the crooks credit for ingenuity, if nothing else. Jan. 26, 2006: DEA and ICE agents uncovered a massive cross-border drug tunnel between the U.S. and Mexico. The cement lined passage linked warehouses in Tijuana, Mexico, and Otay Mesa, Calif. The nearly 1,000-yard tunnel came complete with electricity, ventilation, and over 2 tons of marijuana. Posted at 06:00 PM
  16. hey look a post started by me....
×
×
  • Create New...